Collafl: Path sensitive fuzzing S Gan, C Zhang, X Qin, X Tu, K Li, Z Pei, Z Chen 2018 IEEE Symposium on Security and Privacy (SP), 679-696, 2018 | 472 | 2018 |
New methods for passive estimation of TCP round-trip times B Veal, K Li, D Lowenthal Passive and Active Network Measurement: 6th International Workshop, PAM 2005 …, 2005 | 177 | 2005 |
Approximate caches for packet classification F Chang, W Feng, K Li IEEE INFOCOM 2004 4, 2196-2207, 2004 | 177 | 2004 |
When HTTPS meets CDN: A case of authentication in delegated service J Liang, J Jiang, H Duan, K Li, T Wan, J Wu 2014 IEEE Symposium on Security and Privacy, 67-82, 2014 | 155 | 2014 |
Large online social footprints--an emerging threat D Irani, S Webb, K Li, C Pu 2009 International conference on computational science and engineering 3 …, 2009 | 153 | 2009 |
The case for streaming multimedia with TCP C Krasic, K Li, J Walpole International Workshop on Interactive Distributed Multimedia Systems and …, 2001 | 137 | 2001 |
Modeling unintended personal-information leakage from multiple online social networks D Irani, S Webb, K Li, C Pu IEEE Internet Computing 15 (3), 13-19, 2011 | 119 | 2011 |
Seeing is not believing: Camouflage attacks on image scaling algorithms Q Xiao, Y Chen, C Shen, Y Chen, K Li 28th USENIX Security Symposium (USENIX Security 19), 443-460, 2019 | 99 | 2019 |
Study of trend-stuffing on twitter through text classification D Irani, S Webb, C Pu, K Li Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS), 2010 | 93 | 2010 |
Security risks in deep learning implementations Q Xiao, K Li, D Zhang, W Xu 2018 IEEE Security and privacy workshops (SPW), 123-128, 2018 | 80 | 2018 |
Peerrush: Mining for unwanted p2p traffic B Rahbarinia, R Perdisci, A Lanzi, K Li Detection of Intrusions and Malware, and Vulnerability Assessment: 10th …, 2013 | 80 | 2013 |
Clickminer: Towards forensic reconstruction of user-browser interactions from network traces C Neasbitt, R Perdisci, K Li, T Nelms Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014 | 76 | 2014 |
Fast statistical spam filter by approximate classifications K Li, Z Zhong Proceedings of the joint international conference on measurement and …, 2006 | 71 | 2006 |
Privacy-aware collaborative spam filtering K Li, Z Zhong, L Ramaswamy IEEE Transactions on Parallel and Distributed systems 20 (5), 725-739, 2008 | 68 | 2008 |
Supporting low latency TCP-based media streams A Goel, C Krasic, K Li, J Walpole IEEE 2002 Tenth IEEE International Workshop on Quality of Service (Cat. No …, 2002 | 68 | 2002 |
Peerrush: Mining for unwanted p2p traffic B Rahbarinia, R Perdisci, A Lanzi, K Li Journal of Information Security and Applications 19 (3), 194-208, 2014 | 66 | 2014 |
Measuring and detecting malware downloads in live network traffic P Vadrevu, B Rahbarinia, R Perdisci, K Li, M Antonakakis Computer Security–ESORICS 2013: 18th European Symposium on Research in …, 2013 | 61 | 2013 |
{CIPHERLEAKS}: Breaking Constant-time Cryptography on {AMD}{SEV} via the Ciphertext Side Channel M Li, Y Zhang, H Wang, K Li, Y Cheng 30th USENIX Security Symposium (USENIX Security 21), 717-732, 2021 | 60 | 2021 |
Hold-on: Protecting against on-path DNS poisoning H Duan, N Weaver, Z Zhao, M Hu, J Liang, J Jiang, K Li, V Paxson Proc. Workshop on Securing and Trusting Internet Names, SATIN, 2012 | 59 | 2012 |
JSgraph: Enabling Reconstruction of Web Attacks via Efficient Tracking of Live In-Browser JavaScript Executions. B Li, P Vadrevu, KH Lee, R Perdisci, J Liu, B Rahbarinia, K Li, ... NDSS, 2018 | 56 | 2018 |